BACKGROUND
It is not a secret that crime incidents involving cyber-crime are on the
rise and there is an urgent need for organizations to review their IT
security controls. With the increasing usage and dependency on IT based
operations coupled with growing sophistication in technology,
cyber-crime
is also on the rise. Attacks on sites, directory and routing services
are
often linked to advanced international hackers with extortion in
mind.
In addition increasing use of computers for processing organizational
data
has added a new scope to the review and evaluation of internal controls
for audit purposes. IT controls are of great value in any computerized
system and it is important for an organization to ensure that not only
adequate controls exist, but they also work effectively. Internal
controls
should be commensurate with the risk assessed inorder to reduce the
impact
of identified risks to acceptance levels. There is therefore a need to
evaluate the adequacy of internal controls in computer systems to
mitigate
the risk of data loss due to errors, fraud and disasters or incidents
that
may cause the system to be unavailable.
ABOUT THE TRAINING
This 5-day program is designed to provide a firm base of understanding
of
cybercrime, to show the degree of required competency and proficiency
needed in detecting, preventing and reporting as well as redressing
cyber
fraud.
TRAINING OBJECTIVES
At the end of the seminar, participants will be able to:
• Demonstrate application of new knowledge of IT security systems;
• Identify a range of electronic crime fraud activities;
• Identify how cyber-crime can seep into the business;
• Spot indicators and detect mechanisms on cybercrime;
• Understand required ethical investigations and reporting standards;
• Confidently set out fraud policy, best practice and compliance
mechanisms in cyber-crime prevention;
• Demonstrate how to create an Anti-Fraud culture within the
Organization
TRAINING PROGRAM OUTLINE
The 5-day training program will cover the following aspects:
• Overview of Cyber Crime
• Cyber Crime, Law and Ethics
• Cybercrime Fraud Schemes
• Digital Forensic and Computer Security
• Steps Performed in Digital Forensic
• Developing Digital Forensic Report
• Cybercrime: Information security as Countermeasures
• Access Controls and Management
• Application and Network Security Systems
• Business Continuity Management
• Practical Session
TRAINING METHODOLOGY
The content of the program will be structured from introductory level,
to
dismantle some ‘common sense’ assumptions of what CYBER-SECURITY is and
gain new insight. The program will then build and follow a format of
presentations backed by case studies. For full training value,
structured
and perceptive group work will be included to help apply new awareness
and
skills to apply to different fraud scenarios. Participants must come
with
their laptops to facilitate practical and demonstrations during the
training.
WHO SHOULD ATTEND
The training will be of great benefit to; IT/ICT Managers And Officers,
Data Security Professionals, System Auditors, Finance Managers and
Internal Auditors Site Administrators including all those concerned
about
security and integrity of network infrastructure in banks, National and
County Governments Parastatals, Telcos, Private Enterprises, NGOs and
SACCOS etc.
FACILITATOR: Intex Management Institute Limited
The cost of the training is US$1200 (Kshs. 120,000) per person,
excluding
VAT. This fees, includes tuition, training materials, lunch, morning and
afternoon refreshments. The participants should make their own travel
and
accommodation arrangements but Intex Management Institute will assist in
finding and reserving accommodation in excellent hotels should you
require
us to do so.
HOW TO REGISTER
To register for this training, fill in the registration form attached and send to:info@intexservices.co.keREGISTRATION - FORM.docx (27.7 KB)